Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-06-19
2011-10-04
Hady, Nabil El (Department: 2434)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S150000, C713S151000, C713S152000, C713S189000, C713S190000, C713S191000, C713S192000, C713S193000, C713S194000, C380S270000
Reexamination Certificate
active
08032746
ABSTRACT:
A Tamper-Resistant Communication layer (TRC) adapted to mitigate ad hoc network attacks launched by malicious nodes is presented. One embodiment of the invention utilizes TRC, which is a lean communication layer placed between a network layer and the link layer of a network protocol stack. All aspects of the network protocol stack, with the exception of the routing protocol and data packet forwarding mechanism in the network layer, are unchanged. TRC takes charge of certain key functions of a routing protocol in order to minimize network attacks. Additionally, TRC implements highly accurate self-monitoring and reporting functionality that can be used by nodes in the network to detect compromised nodes. TRC of a node controls its ability to communicate with other nodes by providing non-repudiation of communications. The tamper-resistant nature of TRC provides high assurance that it cannot be bypassed or compromised.
REFERENCES:
patent: 5412654 (1995-05-01), Perkins
patent: 5577209 (1996-11-01), Boyle et al.
patent: 5832228 (1998-11-01), Holden et al.
patent: 6266704 (2001-07-01), Reed et al.
patent: 6931132 (2005-08-01), Billhartz et al.
patent: 6986036 (2006-01-01), Wang et al.
patent: 7113790 (2006-09-01), Athalye
patent: 7346167 (2008-03-01), Billhartz et al.
patent: 2002/0032853 (2002-03-01), Preston et al.
patent: 2004/0025018 (2004-02-01), Haas et al.
patent: 2004/0088567 (2004-05-01), Lamotte
patent: 2004/0103275 (2004-05-01), Ji et al.
patent: 2005/0025172 (2005-02-01), Frankel
patent: 2005/0025182 (2005-02-01), Nazari
patent: 2005/0030921 (2005-02-01), Yau
patent: 2005/0036616 (2005-02-01), Huang et al.
patent: 2005/0053094 (2005-03-01), Cain et al.
patent: 2005/0059379 (2005-03-01), Sovio et al.
patent: 2005/0141706 (2005-06-01), Regli et al.
patent: 2005/0174961 (2005-08-01), Hrastar
patent: 2005/0195814 (2005-09-01), Hagiwara et al.
patent: 2006/0121854 (2006-06-01), Abhishek et al.
patent: 2006/0126845 (2006-06-01), Zheng
patent: 2006/0198394 (2006-09-01), Gotoh et al.
patent: 2006/0253894 (2006-11-01), Bookman et al.
patent: 2007/0204346 (2007-08-01), Meier
patent: 2007/0271458 (2007-11-01), Bosch et al.
Song et al., Secure Routing with Tamper Resistant Module for Mobile Ad Hoc Networks, Mobile Computing and Communications Review, V7, No. 3, 2003.
Buttyan et al., Enforcing Service Availability in Mobile Ad-Hoc WANs, 1st. IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, 2000.
M. Just, E. Kranakis, and T. Wan, “Resisting Malicious Packet Dropping in Wireless Ad-Hoc Networks,” In Proceedings of 2nd Annual Conference on Adhoc Networks and Wireless (ADHOC-NOW'03), Oct. 2003, pp. 151-163, Springer-Verlag, Berlin, Germany.
J. Kong, X. Hong, Y. Yi, J-S. Park, J. Liu, and M. Gerla, “A Secure Ad-Hoc Routing Approach Using Localized Self-Healing Communities.” In Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05), May 25, 2005, pp. 254-265, ACM, USA.
P.F. Syverson, D.M. Goldschlag, and M. G. Reed, Naval Research Laboratory, “Anonymous Connections and Onion Routing.” In IEEE Symposium of Security and Privacy, 1997, pp. 1-11, IEEE, USA.
Y. Zhang, W. Lee, and Y-A. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks.” Wireless Networks, 2003, pp. 545-556, No. 9, Kluwer Academic Publishers, The Netherlands.
B. Schneier and J. Kelsey, “Secure Audit Logs to Support Computer Forensics.” ACM Transactions on Information and System Security, May 1999, pp. 159-176, vol. 2, No. 2, ACM, USA.
J.G. Dyer et al., “Building the IBM 4758 Secure Coprocessor.” IEEE Computer, Oct. 2001, pp. 57-66, vol. 34, IEEE, USA.
C. Chong, Z. Peng, and P. Hartel, “Secure Audit Logging with Tamper Resistant Hardware.” Technical report TR-CTIT-02-29, Aug. 2002, pp. 1-18, Center for Telematics and Information Technology, University of Twente, Netherlands.
G.E. Suh, et al., “AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing.” Proceedings of International Conference on Supercomputing (ICS'03), Jun. 23, 2003, pp. 160-171, ACM Press, USA.
Trusted Computing Group, “TCG Specification Architecture Overview,” (Trusted Platform Module Specifications) TCG TPM Specification, Mar. 28, 2007, Rev. 1.3, ii-vi, 1-54, Trusted Computing Group, USA.
F. Koeune and F-X. Standaert, “A Tutorial on Physical Security and Side-Channel Attacks.” FOSAD 2004/2005, Lecture Notes in Computer Science (LNCS), 2005, pp. 78-108, vol. 3655, Springer-Verlag, Berlin, Germany.
R. Anderson and M. Kuhn, “Low Cost Attacks on Tamper Resistant Devices.” Proceedings of International Workshop on Security Protocols, Apr. 7, 1997, pp. 125-136, No. 1361, Springer LNCS, Berlin, Germany.
X. Zhang, et al., “Secure Coprocessor-based Intrusion Detection.” Proceedings of the 10th Workshop on ACM SIGOPS European Workshop: Beyond the PC, 2002, pp. 239-242.
X. Su and R.V. Boppana, “On Mitigating In-Band Wormhole Attacks in Mobile Ad Hoc Networks,” in In Procs. of IEEE International Conference on Communications (ICC) Jun. 2007.
I. Chlamtac, Marco Conti, and J. J.-N. Liu, “Mobile Ad Hoc Networking: Imperatives and Challenges.”Ad Hoc Networks 1, 2003, p. 13-64, Elsevier B.V., U.S.A.
C. E. Perkins, E. M. Belding-Royer, and S. R. Das, “Ad Hoc on Demand Distance Vector (AODV) Routing.” IETF, Jul. 2003, pp. 1-37, RFC 3561, The Internet Society, U.S.A.
D.B. Johnson, D.A. Maltz and Y.-C. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),” Internet-Draft, Apr. 15, 2003, pp. i-v, 1-111, Internet Engineering Task Force MANET Working Group, www.IETF.org, U.S.A.
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures.” In ACM Workshop on Wireless Security (WiSe'02), Sep. 28, 2002, pp. 21-30, ACM, Atlanta, GA, USA.
Deng, W. Li, and D.P. Agrawal, “Routing Security in Wireless Ad Hoc Network.” IEEE Communications Magazine, Oct. 2002, pp. 70-75, IEEE, USA.
Y-C. Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing.” IEEE Security & Privacy, May/Jun. 2004, pp. 28-39, IEEE Computer Society, USA.
S. Desilva and R.V. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks.” IEEE Wireless Communications and Networking Conference (WCNC), Mar. 2005, IEEE, USA.
J.N. Mait, and R.L. Kugler, “Alternative Approaches to Army Transformation,” Defense Horizons, Jul. 2004, pp. 1-8, No. 41, Center for Technology and National Security Policy, National Defense University, USA.
M.A. Robinson, “Security Solutions Ride Wi-Fi Wave.” SIGNAL Magazine, Aug. 2003. pp. 1-3, Armed Forces Communications and Electronics Association, USA.
E.D. Turnbaugh, “The Next Frontier of Networking—The Airborne Network.” Home Page Article, The Air Force Research Lab, May 2006, AFRL.org., USA.
P. Boyle, “Intrusion Detection FAQ: Distributed Denial of Service Attack Tools: trinoo and wintrinoo.” Research Report submitted in the SANS GIAC Program, 2000, SANS Institute, USA.
K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, “A Secure Routing Protocol for Ad Hoc Networks.” Proceedings of IEEE International Conference on Network Protocols (ICNP'02), 2002, pp. 1-10, IEEE, USA.
Y-C. Hu, A. Perrig, and D. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols.” in ACM Workshop on Wireless Security,WiSe 2003, Sep. 19, 2003, ACM, USA.
Y.-C. Hu, A. Perrig, and D. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks.” In Proceedings of IEEE Infocom 2003, 2003, IEEE, USA.
I. AAD, J-P. Hubaux, and E.W. Knightly, “Denial of Service Resilience in Ad Hoc Networks.” In Proceedings of ACM MOBICOM Wireless Security Workshop (WiSe),MobiCom'04, Sep. 26-Oct. 1, 2004, ACM, US
Boppana Rajendra V.
Winsborough William H.
El Hady Nabil
Jackson Walker L.L.P.
Rourk Christopher J.
The University of Texas at San Antonio
LandOfFree
Tamper-resistant communication layer for attack mitigation... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Tamper-resistant communication layer for attack mitigation..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tamper-resistant communication layer for attack mitigation... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4293510